runc container breakout

Feb. 12, 2019

The vulnerability allows a malicious container to (with minimal user interaction) overwrite the host runc binary and thus gain root-level code execution on the host. We encourage users and administrators to review RedHat and Amazon Web Services blogs.